Cybersecurity to Improve Profitability
· ICS Security

Cybersecurity to Improve Profitability

Cybersecurity has financial benefits, offers product differentiation, and smooths out the patching processes both for product manufacturers and their customers. The importance of cyber defense will go up over time. Cyber defense and security for embedded systems is justified using a total cost of ownership approach, as quantifying economic benefits will help justify faster adoption. […]

Read more →
eBook: Manufacturing Cybersecurity Case Studies
· Cybersecurity

eBook: Manufacturing Cybersecurity Case Studies

For factories and manufacturers, the need for cybersecurity is urgent. This is due to the concerns arising from operation stoppages caused by security incidents, resulting in loss of revenue. Unlike enterprise IT, system administrators face several issues within smart factory security, namely with difficult-to-eliminate vulnerabilities, the spread of malware, and flat network configurations. Furthermore, when […]

Read more →
White Paper: The State of Industrial Cybersecurity
· Cybersecurity

White Paper: The State of Industrial Cybersecurity

While global manufacturing companies are implementing digital transformation to survive and grow, cybersecurity threats have become a top concern. In industrial cybersecurity, the convergence of IT and OT has been an important issue for long time. There were inconsistencies in technology and environment, and also in people and processes. This survey provides insight into the […]

Read more →
Cybersecurity for Embedded Systems
· ICS Security

Cybersecurity for Embedded Systems

All critical infrastructure is under cyber attack, all the time. The attack on the Oldsmar, FL water supply is a good example. And it’s getting worse; vulnerability to cyber attack is increasing as the embedded devices controlling these critical infrastructures become more connected. The DevOps approach to software development offers an antidote—an opportunity to embed run-time […]

Read more →
How Industrial Control Systems can be secure in the cloud
· Cybersecurity

How Industrial Control Systems can be secure in the cloud

Last month, a major water utilities firm in the UK revealed plans to move a significant part of their SCADA system to the cloud. This is one of the most high-profile transitions of OT to managed cloud services to date. Though moving Industrial Control Systems (ICS) to the cloud has been theoretically possible for at least 10 […]

Read more →
Cybersecurity for Shared Cloud Environments
· Cybersecurity

Cybersecurity for Shared Cloud Environments

In its recent Cloud Workload Protection Platform (CWPP) research note, Gartner identified memory exploit protection as an essential component of any organization’s CWP strategy (Gartner, Cloud Workload Protection Platforms, 2020):  “Exploit Prevention/Memory Protection–application control solutions are fallible and must be combined with exploit prevention and memory protection capabilities…”—Gartner CWPP 2020 Cybersecurity Considerations for the Cloud Cloud deployments […]

Read more →
IIoT World Days Track: ICS Security – Risks, Strategies and Solutions
· Augmented Reality

IIoT World Days Track: ICS Security – Risks, Strategies and Solutions

Track Sponsored by aDolus This track, originally presented at IIoT World Days on June 30, 2020, covers 4 presentations from industry leaders in ICS Security: Five Blind Men and the Elephant called ICS Supply Chain Security The Road to Industrial IoT Security Automated ICS Vulnerability Assessment Identifying Compromises Through Device Profiling Using Open Source Tools […]

Read more →
Rogue Automation: Vulnerable and Malicious Code in Industrial Programming
· Cybersecurity

Rogue Automation: Vulnerable and Malicious Code in Industrial Programming

In this White Paper, previously unknown design flaws that malicious actors could exploit to hide malicious functionalities in industrial programming for robots and other automated manufacturing machines are revealed. Since these flaws are difficult to fix, enterprises that deploy vulnerable machines could face serious consequences. An attacker could exploit them to become persistent within a […]

Read more →
IIoT World Days Track – ICS Security: Bringing Order to ICS Cyber Chaos
· Cybersecurity

IIoT World Days Track – ICS Security: Bringing Order to ICS Cyber Chaos

Track Sponsored by and This track, originally presented at IIoT World Days on July 1, 2020, covers 5 presentations from industry leaders in ICS Security: ICS Security Bringing Order to ICS Cyber Chaos Addressing the Business and Cyber Security Challenges on the New Industrial 4.0 Convergence Creating and Performing a Cybersecurity Tabletop Exercise CMMC, the […]

Read more →
Securing IT and OT in Industrial and Manufacturing Environments
· ICS Security

Securing IT and OT in Industrial and Manufacturing Environments

For many years, industrial control systems—often called “Operational Technology” or OT—have been relatively safe from cyber attacks. The control and telemetry systems used in industrial plants and manufacturing environments were typically placed on isolated or “air gapped” communication networks, and the systems themselves were based on highly specialized operating systems which were difficult to attack […]

Read more →
Smart Factory Case Studies
· Cybersecurity

Smart Factory Case Studies

This summary contains three Smart Factory success stories in IoT manufacturing, from the Semiconductor, Manufacturing and Electrical Engineering industries.  They describe how Trend Micro expertise and solutions addressed a variety of business challenges, including security solutions for cloud infrastructures, connected threat defense and the need for vendor support, visibility across the IT environment and keeping […]

Read more →
Ensuring cybersecurity resilience in an ultra-connected world
· Cybersecurity

Ensuring cybersecurity resilience in an ultra-connected world

The development of the Internet of Things (IoT), Artificial Intelligence (AI), the cloud and big data have enabled devices that started out as unbelievable concepts to become a reality. From a consumer standpoint, these ever-increasing trends are often taken for granted as people become accustomed to smart devices becoming more commonplace in all aspects of […]

Read more →